Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 13:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe
-
Size
717KB
-
MD5
04c32827e32ed5f337ca2b8a333650eb
-
SHA1
18323d36d437332243510739b1de83aea4bbf376
-
SHA256
cd404cafd47781916d9f87642a3480ae62505fd176d0793ec01dd00431e00e1e
-
SHA512
9c600896c940d6e25677cd4c4e0f0764e990dc5ba37db0f6609fc3a98ea05e2a18c2bfae877267202448814ef0ab4b19fcf32e1a9a2be8025fe45e0975154e1b
-
SSDEEP
12288:sc//////MH00msiGLOV4gf0PegUbPcRLI26m0P5xYSNtcLsVHPjhs:sc//////MHVKb/fwegUbczQ/YSNtcL8i
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/1340-6-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/1340-4-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/1340-7-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/1340-8-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/1340-9-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/1340-15-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/1340-12-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2176 set thread context of 1340 2176 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 31 PID 1340 set thread context of 2816 1340 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443626970" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41FAF8D1-D7F9-11EF-999E-E67A421F41DB} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1340 2176 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 31 PID 2176 wrote to memory of 1340 2176 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 31 PID 2176 wrote to memory of 1340 2176 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 31 PID 2176 wrote to memory of 1340 2176 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 31 PID 2176 wrote to memory of 1340 2176 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 31 PID 2176 wrote to memory of 1340 2176 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 31 PID 1340 wrote to memory of 2816 1340 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 32 PID 1340 wrote to memory of 2816 1340 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 32 PID 1340 wrote to memory of 2816 1340 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 32 PID 1340 wrote to memory of 2816 1340 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 32 PID 1340 wrote to memory of 2816 1340 JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe 32 PID 2816 wrote to memory of 2808 2816 IEXPLORE.EXE 33 PID 2816 wrote to memory of 2808 2816 IEXPLORE.EXE 33 PID 2816 wrote to memory of 2808 2816 IEXPLORE.EXE 33 PID 2816 wrote to memory of 2808 2816 IEXPLORE.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ba1ff1f32ca037af9e6d1927bfe874
SHA134d4b7b135850957959fee510bfdbdb42914aa07
SHA2564bef6977f89a7234a42894846fa9863ce18395654332ee509195b4d8fdf2050a
SHA51287e82dab84336124308e4b6678d8a4bf601f61efa998a9eabffc3c3517aec403239e402041e264c6d1b40a221598321fbaac0aae1a94616a85edeafbd8cf541c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2ce8a0d42275a130419f9d569e43a1
SHA1342363f3c00ffa7b9bdd994fd929b3503bad1210
SHA256bd1dd3e4f6b93327da828d0c388acab845d2c1fc4b8ace466ddefc87ecb36f53
SHA512b784b8a13d58091e776bff3bab27c78e5d2fe9877e90cff83cb707b7e27f5dc26970e2070ba213a6be4f738144c2ed23134b4c96c2ddfc92f2aaae398d653026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5dd243226e8c2cb789e6bd09824843f
SHA1d4f7db12713cba17d8412b400c2e9e1fc6a90b53
SHA2567a18c0adf973d49c40f21d63b5b2cf3a2ed5cf31b930322ef2abfc3631d4b054
SHA512dc9b541197aa3faf56be8412f0b94a1c75a2f1c929e8056cd94c6be3eeda2abdd074c85adaaabd9f22abff2f05a97e4ea416a4a12b5f9b377a7f66ef92f05fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d497b63860c1af9865a709b03316abc0
SHA188e14c153b9bcf68e77f33e6927127c04f87f422
SHA25632ac1e41aa79afdec3a1c039f271dfd81472fc287f30336f221a925c7fa6d3ae
SHA512f1998aeb33f00ba7e0df4e3779aaef167c2f302c27a4a1796699a3906ab939e5ecd6470aa12da1009c951db12f3bb747f87751cfc1bf8f0b944ed4a2b2370646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a36d2646737ee8e160caead53fbfcf6
SHA1f3b82b6dc0ae128fad57205348c2e5aeff7ec0d3
SHA256bac9ff0105cd3339ff854a1492e5d79736fb814d6d8c809983fe56b32f96a833
SHA51227b706cd68fafd3386db2195739c57aea59bcb6bf4f763586b0ea91565a856da9bfa4cdf4859fef7eeaec6a12fcc607747506018843f300f9e15121920b75450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebde9a7f332d6154959231301bb38523
SHA1ea91953184a39ceb01cd13fb07e99aa1249817fd
SHA256e99fbbc0898181a97721735764790e32286138d6fce74db08aa7564f95127ab7
SHA51241170fffc6c9a98ffa683266a0a12c3268fddda9f333cb7dd0521fb3be8a96950379c7ad09dfe46feae0e2bc738f2c6921073c533b90eb03d666320cf1ac6a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136a64eddcf297b6984f14bed08f9738
SHA12c7161b805266306e8d19f27917a5377cb4644dd
SHA25662c1648fdbc00510a198cb4d3a1ab607ab0ab4e745bc8764f13b021415300471
SHA512a2fd7d88cc1b1e02aecd5730a84b0d18ec480dedb224263680b0a831cc05092b1ba3833f47c88b6e30033e22b0fa8829e06141d72dc9f78ca3fbd986a78c8584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d2ec192dc15d686b76d6b26427215d
SHA1e9de5657189c3ca1c4f6b12627ab54005bb308c3
SHA256ee7e988047832e96179faf892eb617e8ebed4f5c87314dbda8700304b009d33b
SHA512bcff34f696a627a70ea216a71644ee400930e8506291ff49ff2c59ccebd0265b61c808ebffc8b03d258eec5676e6b87079dc0d3dd7e1e4a3b198f290594c725d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445422c38998e8bd653688c11281cb22
SHA15e97739741d9cf20114f51cb5c6744b52caaed97
SHA2560c3dc505e1788c2eb5e30cfa2c9896d968c6884e8e6a968d3f29d4f01fb2e2e7
SHA512bed064fd5876da457416a40f211e783e1545952e2a0fa02e4b15cfd71c6add8dfe709cbc3bfa7024d47b5f0a2de9de8b93771fec012a581e08f1459a302ed480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1a02cf6e881455990a1be7376eabea
SHA1314dd90871f2b1551c69079aafc16eb602681337
SHA256e7e575886376fbd410b67caff5b1f96f12fb194d5b6fbe4134dfc1b2b71e59a7
SHA5127903380b7f351756aa8a48dd0a24975144193c72514f279eb70444e75b4cd984a9c8364c2ce661b1f419469b9c60e19226ff951e64ba5f9f57ea1e1e2a2b9ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54398d0c24b7201525e44e187c6f3b1a1
SHA1778e4a280c5344079de76a5ed067597003114a11
SHA2568c8c6478f4da5824e97c0decb6f0d170c6674e1b3bfc0fe4b16384aeb6c07e6b
SHA512ae8f316500bd22c66c9c781c6e34c7ae1899570928cc8c097bdb8f783b5a5860c293be6141185d1306b0100c4dda74ab240d2268ed481c01385c4af1cefc1020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5519d1d67189bae3fb313b6de5b1b843f
SHA12e0b0f7033b4161b9eb710612ae7763804bf994e
SHA25669d8d0984d3b1e55a212c2290c67ba79fa3ecfd664d49a5176792ed01f7a7d2a
SHA512abdcd26a1c46d4cc1324bc5a54c217d8f247d285aea03470ee1c839a9444f1564102bb3161334db33302e5ef0171e43b736304b1dffba3f96d297ec320c11a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0fb04c1cbbc790d8c1db363b324b0e
SHA12f1ec2b7d04ee7a52bd8d9de037b2317c8ff8551
SHA2569423b9b0b243bbd4802b7a9297984d3cd9275eccb2f83e10b32df9c5dbd88e91
SHA51260408909fdc4488b31d5ad907c7b855ad6eda2842c5d7f2166d99450b631b569a1c0745eb119ecf01304d119b19b8fbabf4322dcda97625382a01c4b8d05c9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775c7e3090bffa9b5e897fe210663d8a
SHA13753c7844ae4f3341f6c3d210b0bce62e1fe6348
SHA25635a99109d522221844970d200806756084ddcf4a7c82d861725b362215e41324
SHA5120cca1335e8cc8984dde20ef24d8b3dbd0024df43247d857927dd7cfcd2571df0c5d46290159b25ae741cbaf2ee04dc621de7204d97f9a8c94e01e5a7d2bdef60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e952b849effcf1ac89a20573655357bf
SHA1229e0932f15a35a53fe46afd5d6e2f715bb4ab1b
SHA256b995629670ec4b0e16069308d07dea2368df67879e1117035b3807d151d40dc9
SHA512a0a1dbb3e4ee1ae51c0be7abc69fbbb9a9b4bf67cbb6f96cc299a8f52606d692fb63bca62509fee636e35ad9d3247b52d06c428af3f32c88108ce29d9600e304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531faf50932ab5a9cd142349f468c3890
SHA16323e1ed53f28da45e60e2278d0ed7a16090ef9a
SHA2565b396c89e42f59e77e6f5f23bf4f1a3e208d4770841b79e532fbf3448c3fb354
SHA512cf02b15ab35d201101b83607707e259af98bac6c67ba430d24cff0832c2bafe3f1f0f1939335b65cd546803dc397982b75253568f9ef660586e89db3b2918098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b08020decc498269b7208226741938
SHA125d1f53edab08a5cbab07894a1f33344a7ac0007
SHA2568d9eef4a89d0f7b519e1b1161b8b87a47c2bd4838547edf63b154034604bd21e
SHA51221517598ef0d3464a23f3ff044476aef3f8440f431910a518bea208d845b13e26a251d908a59d75dc8d24da8561fa6827fe312bd63727b8f04d3bf3b33e25cf7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b